OpenFog Consortium Introduction and Overview at W3C Open Day May - - PowerPoint PPT Presentation

openfog consortium
SMART_READER_LITE
LIVE PREVIEW

OpenFog Consortium Introduction and Overview at W3C Open Day May - - PowerPoint PPT Presentation

OpenFog Consortium Introduction and Overview at W3C Open Day May 2017 Agenda Whats Fog Computing ? OpenFog Consortium OpenFog Reference Architecture Technical WG Focuses (Security, Smart Objects, Manageability) Moving


slide-1
SLIDE 1
slide-2
SLIDE 2

Introduction and Overview at W3C Open Day

May 2017

OpenFog Consortium

slide-3
SLIDE 3
  • What’s Fog Computing?
  • OpenFog Consortium
  • OpenFog Reference Architecture
  • Technical WG Focuses (Security, Smart Objects,

Manageability)

  • Moving Forward..
  • Q&A

Agenda

slide-4
SLIDE 4

What’s Fog Computing?

slide-5
SLIDE 5

CLOUD

FOG COMPUTING

A system-level horizontal architecture that distributes computing, storage, and networking closer to users, and anywhere along the Cloud-to-Thing continuum

What is fog computing?

System-Level

from Things to the Edge, and over the Core to the Cloud, spanning multiple protocol layers (works over and inside wireless and wireline networks)

Cloud-to-Thing Continuum Distributes resources and services to anywhere along the continuum (not just at the edges) Converged Cloud/Fog platforms and services (not just isolated edge computing devices / apps)

Horizontal

Supports multiple industries (not limited to any specific industry, network type, or application domain)

Architecture

for distributing,

  • rchestrating, managing,

securing resources and services (not just placing servers, computing resources, apps,

  • r small clouds at the edges)
slide-6
SLIDE 6

Why Fog? It’s necessary to run IoT, 5G and AI applications

slide-7
SLIDE 7

Use Cases

Selected fog scenarios

Traffic Congestion

$160B cost of traffic delays in US alone Solutions developed in silos hinder information sharing; data sources are bandwidth intensive and complex Fog computing ensures sharing of data from vehicles and along roadways 1

Video Surveillance

Cloud doesn’t scale to support wide- scale surveillance (highways, cities, airports, etc.); rapid security decisions must be made on location HD cameras generate terabytes of data per day Fog nodes intelligently partition video processing between cameras and cloud, enabling real-time, latency sensitive analytics 2

Smart Buildings

Safety, security, energy efficiency and comfort in buildings is an

  • ngoing concern

Telemetry data is sent from thousands of sensors simultaneously Fog computing creates smart, connected spaces; fog nodes for individual rooms can perform all monitoring and response functions 3

Problem Challenges Fog Technology

?

slide-8
SLIDE 8

Why fog? Beyond necessary, it enables growth through new business models

Reshape the Industry Landscape Create Disruptive New Service Models Integrate and Converge Cloud–Fog Services Enable Rapid Development and Deployment of Fog Systems and Applications

Routers, switches, application servers, and storage servers converge into unified fog nodes Players of all sizes, not just massive cloud operators, build/operate fogs and

  • ffer fog services  “WiFi

Model” and the rise of local/regional fog eco- systems and operators? For a business to function as a cohesive whole, cloud and fog will converge into

  • ne common infrastructure

for integrated and unified cloud and fog services: development, deployment, monitoring, management, security, … Rapid deployment of localized applications  shifting from “build the cloud and see what services we can put on it” to “find what customers want and quickly put together a fog for them”

slide-9
SLIDE 9

Was it necessary to create a TCP/IP-for-wireless telecom? a TCP/IP-for-wired? a TCP/IP-for- enterprise? … NO

To work, fog computing must have universal interoperability

TCP/IP

A standard and universal framework to distribute packets

Fog Computing and OpenFog Consortium

A standard and universal framework to distribute resources and services and Manage, pool, orchestrate, and secure these distributed resources and services Is it necessary to develop a fog-like system for 5G? another for wired telecom? another for enterprises? another for smart city? another for manufacturing? … NO

WWW

A standard and universal framework to access files anywhere Was it necessary to develop a HTTP- for-wireless? a HTTP-for-wired? a HTTP-for-enterprise? … NO

slide-10
SLIDE 10

OpenFog Consortium

slide-11
SLIDE 11

Building this necessary interoperability of fog-enabled applications requires a collaborative approach

Proprietary or single vendor solutions slows down adoption and innovation.

An open architecture will:

  • Provide a robust new platform for

product development

  • Increased quality and innovation

through competition in the open environment

  • Lead to a vibrant, growing supplier

ecosystem

  • Accelerate market adoption
  • Lower system costs
slide-12
SLIDE 12

Building the Cloud to Things Continuum.

Storage Network Compute Accelerators Control

OpenFog mission

Mission Statement: To drive industry and academic leadership in fog computing architecture, testbed development, and a variety of interoperability and composability deliverables that seamlessly leverage cloud and edge architectures to enable end-to-end IoT scenarios.

slide-13
SLIDE 13

OpenFog Consortium

A growing, global ecosystem of fog experts

57 members strong, headquartered in 15 countries as of May 2017

Founders Contributing Members Affiliations

slide-14
SLIDE 14

Develop, Solve, Identify & Create Foster, Initiate, Provide & Influence Gain, Promote, Evangelize & Educate

OpenFog Consortium goals

Technology Innovation Education

slide-15
SLIDE 15

Chair(s) Architecture Framework WG Chair(s) Communications WG Chair(s) SW Infrastructure WG Chair(s) Security WG Chair(s) Manageability WG Chair(s) Testbed WG

Organizational structure

Chair(s) Liaisons WG

Marketing Committee Technical

Committee European Committee

Japan Committee Americas Committee

Greater China Region Committee

Board of Directors

Officers: President, Chairman, Treasurer, Secretary

Affiliation Committee

Management (AMS)

Social Impact

Committee

slide-16
SLIDE 16

Japan Region Committee

R-Director Chair Tech-Seat Tech-Seat Marketing- Seat Government- Seat

Voice of the Regional Committee Leads Committee Meetings Co-Conduit to BoD Host/Fund Operational Model Assist Initiatives Orchestrates Marketing Activities Host Annual Fog Event Conduit to Local Governments Conduit to Global Initiatives / Activities

Academic- Seat

Represents Academic / University / Research Projects Host/Fund Operational Model Assist Initiatives

Innovators- Seat

Represents Innovators / Makers Masahiro Shimohori Jeff Fedders

Deputy Liaison

Osamu Ogasahara Imai Toshihiro

Local Consortia

Japan IoT R&D, Standards, Ventures and Policies

Tech Liaison- Seat

  • Alt. Voice of the Regional

Committee Conduit to BoD Liaison to Regional Standards Bodies Niki Agata Makoto Yasuda

Japan Regional Committee

Tech-Leads

Lead technical agenda

  • Incl. collaboration with

global team Architecture Framework Leads SW Infrastructure Leads Communication Leads Security Leads Manageability Leads Testbed Champ

slide-17
SLIDE 17

Japan Country Team: Priority Focus Areas

Use-Cases

  • Transportation
  • Industrial

Regional Collaboration

  • Local Consortia
  • Government

Testbeds

  • Work-in-progress
  • Focused use cases of regional

interest

  • Car Share
  • Connected Smart Factory
  • Affiliation with IoT

Acceleration Consortium (more than 28,00 members) backed by METI and MIC

  • Works in alignment to the

OpenFog global Testbed Workgroup & Technical Committee

slide-18
SLIDE 18

OpenFog Reference Architecture

www.OpenFogConsortium.org/RA

slide-19
SLIDE 19

Unified framework & roadmap to help software developers and system architects create the first generation of open fog computing systems develop compute, network, storage and control technologies for the cloud-to-things continuum.

The OpenFog Reference Architecture Framework

1 2 3

First step in creating standards to enable interoperability in IoT, 5G, Artificial Intelligence and other complex data and network intensive applications. Creates a common language for fog computing and will help unify the edge/fog ecosystem under a single, interoperable, testable set of hardware and software standards.

slide-20
SLIDE 20

Security Scalability Open Autonomy RAS Agility Hierarchy Programmability

  • Trust
  • Attestation
  • Privacy
  • Localized

command, control & processing

  • Orchestration

& Analytics

  • Avoidance of

network taxes

  • Resource visibility

& control

  • White box decision

making

  • Interop & Data

normalization

  • Flexible
  • Cognition

& agility

  • Value of data
  • Reliability
  • Availability
  • Serviceability
  • Tactical &

strategic decision making

  • Data to wisdom
  • Fully cloud

enabled

  • Computational &

System

  • Autonomy at all

levels

  • Programmable

SW/HW

  • Virtualization &

multi-tenant

  • App Fluidity

Storage Network Compute Accelerators Control

Key pillars of the OpenFog architecture framework

The pillars describe requirements to every part of the fog supply chain: component manufacturers, system vendors, software providers, application developers.

slide-21
SLIDE 21

Architecture description with perspectives

slide-22
SLIDE 22

Architecture description with perspectives

node view system view software view perspectives perspectives

slide-23
SLIDE 23

A closer look at fog nodes

  • They form a mesh to

provide load balancing, resilience, fault tolerance, and minimization of cloud communication.

  • They communicate

laterally (peer to peer, east to west) and communicate up and down (north to south)

  • Are able to discover, trust,

and utilize the services of another node in order to sustain reliability- availability-serviceability

Fog nodes in a Smart City: Buildings, neighborhoods & regions are connected to provide an infrastructure that may be optimized for service delivery.

slide-24
SLIDE 24

Technical WG focuses

Security, Smart Objects and Manageability

slide-25
SLIDE 25

Security Workgroup

Overview

slide-26
SLIDE 26

Reference Architecture Contributions

slide-27
SLIDE 27

 Node Security is the basis of Fog Security

 A Hardware Root-of-Trust is the foundation  Physical Security needs to be considered for all

deployments

 Trusted hardware executes immutable trusted

firmware

 Extends the Chain-of-Trust through instantiation of

components

Node Security

27

slide-28
SLIDE 28

Network Security Aspect

 Communications Security

 All communications run through

TCP/UDP/IP stack

 Node-to-Cloud

  • WS* / REST over TLS

 Node-to-Node

  • HTTP over TLS
  • COAP over DTLS

 Node-to-Device

  • IP Adaptation
  • WLAN/WPAN: 6LowPAN
  • PLC: PRIME IPv6 SSCS
  • Automation: CIP EtherNet/IP

 Services Security

 NFV Security Appliances  SDN Service Provisioning

slide-29
SLIDE 29

 Data in Use

 Data in memory undergoing processing

  • Encrypted Memory

 Data at Rest

 Data in storage

  • Full Disk Encryption
  • File / Database Protection

 Data in Motion/Transit

 Data exchanged via (virtual) interfaces

  • Communication Security
  • Content Security

Data Security Aspect

slide-30
SLIDE 30

 A Base Set of Standardized Crypto Functions must be supported by

all Fog Nodes to ensure interoperability.

 An initial base list was selected from FIPS 140-2 spec.;  A complete list including regional standardized functions from Europe,

China, Japan, … will soon be created.

 Based Set must be updated regularly.

 NIST Recommendation for Transitioning the Use of Crypto Algorithms and

Key Lengths will be followed;

 Subsequent revision will include transition approaches work for regional

crypto functions.

 Compliance does not guarantee security!

 Crypto Functions selected for fog components should be appropriate for

their use and in agreement with stakeholder’s threat assessment.

 Formal Validation of Crypto Modules is left as an option to vendors.

Cryptographic Functions

slide-31
SLIDE 31

New Work & Taskforces

slide-32
SLIDE 32

Security Requirement Taskforce

* We refer to a network of virtual or physical entities within the Fog.

Mission statement

The mission of the Security Requirement TF is to define sets of requirements that has to express the fundamental security (and in the future evaluation) requirements for an OpenFog compliant (in the future certified) node and system. As a reminder, this work shall support both brown and green field implementations. The requirements will be split into 3 sets, each one covering a specific domain of the OpenFog architecture:

  • Node Security
  • Network/Communication* Security
  • Service Management

Strategy

The strategy is define on a 2 phases basis. 1. Compliancy program: In a first phase, the group will focus on the delivery of an OF security compliancy program. A security compliancy program consists of guidelines on security functional requirements for an OF node and system to promote a good level of security. 2. Certification program: In its second phase, the group will then focus on delivering a certification

  • program. A certification program consists of precise

security functional and evaluation requirements for an OF node and system to assure a measurable level

  • f insurance of security.
slide-33
SLIDE 33

Security Requirement Taskforce

Method

As the plan is eventually to obtain a certification program in place, the compliancy phase methodology shall be delivering content that will fully compatible for the certification phase. The Common Criteria methodology has been identified as a viable method to build a Security Certification. Thus the following CC compatible documents will be produced in the 1st phase for each OF domain listed previously:

  • TOE: Target of evaluation, defining the product or

system that is the subject of the evaluation

  • PP: Protection Profile, defining the following Security

points:

  • Problem definition (Threats, assumption, …)
  • Objectives (ex. protected storage, comm …)
  • Functional Requirements (protecting the TOE in the

context of the Problem definition to ensure Objectives)

Deliveries and reporting

The deliveries of the group are defined by the methodology and so consist of:

  • TOE for the 3

domains

  • PP for the 3 domains
  • Planning for the Sec

WG Planning*

ToE PP

Evaluate certified

* Dependent on reference architecture formal definition progress.

Node Sec. Net./comm. Sec.

now

  • Serv. mgt.

Jul 17 Dec17

slide-34
SLIDE 34

Security MVIs

 Security MVIs

 Must be described in such that they allow for both innovation and diversity in the solutions

provided by different vendors and products, both now and in the future.

 The MVIs will trace the Security MVIs from power-on until the full system is instantiated.

 A Functional Description of Security MVIs is required

 Requires a description of how the other system components utilize them.  The functional requirements need to be expressed in such a way that they are testable.

 OpenFog systems

 The components chosen must interoperate with the rest of Fog Computing infrastructure.

 Security MVIs

 First pass: Will describe the hardware features minimally needed in order to provide a

secure base for fog nodes.

 The Second pass: will define Security MVIs in terms of functions/services from a software

perspective

slide-35
SLIDE 35

Smart Objects for an OpenFog Architecture:

SW Infrastructure WG – Task Group Jeff Sedayao, Eve M. Schooler Intel IoTG May, 2017

slide-36
SLIDE 36

Smart Objects for an OpenFog Architecture

SW Infrastructure WG – Task Group

  • What are Smart Objects?
  • Why do we care about Smart Objects?
  • Smart Object Landscape
  • Smart Object Issues
  • Task Group Charter
slide-37
SLIDE 37

What’s a Smart Object?

  • Smart Object: An object that describes its
  • wn possible interactions [1]
  • Objects can be physical, e.g., sensor,

computing device, wearables

  • Objects can be cyber, e.g., data, executable

code, apps, services, clouds

  • A Smart object’s description and metadata

need to be stored and maintained somewhere

  • A Smart Object Framework includes ways to

describe, identify, and interact with smart

  • bjects

Q.How do you turn on a light bulb?

  • A. Get a description of how to

interact with the light bulb and then turn it on in accordance with the description

slide-38
SLIDE 38

Why do we care about Smart Objects?

  • Without some form of self-

description, IoT object interaction must be built into application logic

  • Code must be added for new object types
  • A problem that really exists [2]
  • A Smart object approach promises a

way to quickly build and maintain applications

  • Commonly cited needs:
  • Data interoperability
  • Service, object, and SW composition

Reduce time and cost to develop, deploy, and maintain IoT applications

You shouldn’t have to hardcode the logic of turning on each different kind of light bulb or each different light bulb vendor

slide-39
SLIDE 39
  • Standards bodies and alliances: e.g.,
  • Intel recent History…
  • NIST Cyberphysical Systems Initiative - Data Interoperability WG
  • IETF/IAB Workshop on Semantic Interoperability
  • NSF-Intel ICN-WEN program

(Information Centric Networking in the Wireless Edge Network)

Smart Object Landscape

slide-40
SLIDE 40

Smart Object Issues

  • Frameworks:
  • Standards: So many to choose from!
  • Ontologies: Even more to choose from!
  • Interoperability: What form of interoperability

(syntactic, semantics, object, etc.)?

  • How to develop distributed IoT services using

metadata?

  • Discoverability at scale
  • Naming, Lineage and Access
  • Semantic Interoperability – does setting a

light bulb to “on” give you usable light?

  • Maybe not if lumens output is set really low
  • Maybe if light bulb only has two output levels –
  • ff or some set amount of lumens
  • Security
  • Q. Can you turn on a light bulb?
  • A. Maybe:
  • if you use the right standard and
  • if you use the right ontology
  • r if you have a bridge to another framework

and semantics match

  • If you can discover the light bulb
  • If you can address the light bulb
  • If you have permission
slide-41
SLIDE 41

Charter

  • Assess the Smart Objects landscape and contribute to a living survey
  • Highlight the most relevant models and frameworks
  • Identify commonalities, taxonomies, gaps
  • Capture minimal/optimal requirements for Fog-inspired use cases
  • Object framework (e.g., discoverability, bridging, registries)
  • Fog formation
  • Work orchestration
  • Data economy
  • Build tools and demonstrate viability of Smart Objects approach
  • POC(s) implemented (on OpenFog testbed)
  • Open Source

Identify, coordinate with, influence, extend, and drive relevant standards

slide-42
SLIDE 42

Transaction Management & Orchestration Prin inciples

Katalin KB Walcott – Principal Engineer, Intel IoTG

Intel Fog SW Architecture Technical Lead katalin.kb.Walcott@intel.com

Intel Corporation – Concept Recommendation

slide-43
SLIDE 43

Compute Storage Compute Compute Project 1 Not Available Available Available Available Repo Repo Project 2 Project 3 Available Storage Compute Compute Not Available Available Storage Available Compute Repo Project 4 Repo

Logical

  • gical Transaction

ansaction Layer ers s – conc ncept t

Fog Transaction & Management Data, Object, Interface & Access Microservice Logical Fabric assemblies Fog Platform Infrastructure – Shared Resources

Intel Corporation – Concept Recommendation

slide-44
SLIDE 44

44

Wha hat t is s a Tran ansa sact ctio ion? n?

Contract Management of Transaction based Agreements

<Service name> will be available <#%> of time during <hrs> of operation during <hrs> and <days> of the week.

  • Individual service outage in excess of <time period> or <sum> of outages exceeding <time period> will constitute violation

<#%> of <service name> transactions will exhibit <#seconds> or less response time, defined as the interval from the time the user sends a transaction to the time a visual confirmation of transaction completion is received.

  • Missing the metrics for business transactions measured over any business week will result in a violation.

Transaction based TLA time 10 seconds Internet 3 seconds Systems + Storage 2 seconds Application 3 seconds Network 2 seconds Example Metrics:

  • Customer tests

connected through major ISP Example Metrics:

  • Transaction response

time Example Metrics:

  • CPU Utilization % of

total process

  • I/O response time in

ms

  • Memory utilization

Example Metrics:

  • Bandwidth utilization
  • % of total protocols
  • Throughput in ms

Example: Transaction Response Time for Promised Service Levels

Service Elements:

  • Include the specifics of services provided:
  • Conditions of service availability
  • Standards such as time windows for each level of service
  • Responsibilities of each party
  • Escalation procedures
  • Cost/service tradeoffs

Management Elements:

  • Include the definitions of measurements:
  • Methods
  • Standards,
  • Reporting process
  • Content
  • Frequency
  • SLA breaches

Metrics to Monitor:

  • Monitoring schemas may include:
  • Service availability – amount of time the service is available for use
  • Usability – timeliness, transaction completion, latency, refresh rate
  • Delivery - Performance , Availability, Reliability
  • Defect rates – percentages of errors in major deliverable
  • Technical quality – measurement of quality in delivery (time, response rate etc…)
  • Security /Trustworthiness -

Intel Corporation – Concept Recommendation

slide-45
SLIDE 45

Delivery Model Scheduling & Orchestration Layer Composition & Assembly Layer Logical Landscape Atomic Resource & Allocation Layer Physical Landscape

MINUTES MINUTES HOURS HOURS SECONDS MINUTES MINUTES

+ + + … …

COMPUTE STORAGE NETWORK Orchestration & Intelligent Placement TLA

TLA TLO TLS

TLO TLS

CPU RAM NIC DISK POWER FAN CNTRL IOT

Metric

Tran ansaction action Level el Man anag agemen ement t Elemen ments ts

Edge

Transaction Level Agreement

Transaction Management (Blockchain) Datacenter FOG

Intel Corporation – Concept Recommendation

slide-46
SLIDE 46

Resou source, ce, Data, ta, Object ject Transaction nsaction Managemen agement

Sensors Fog Platform Hardware Network Fog Infrastructure Software Microservice s Microservice Distribution Transaction Composition Transaction (TLA)

  • Real-time

Asset/Resource & Capacity Management

  • Reputation Services
  • Service Domain

Management (Zones)

  • Fog Asset

Characterization (distributed CMDB)

  • Predictive service

fulfillment models Workload service

  • ptimization (shadow

provisioning techniques; brokering)

  • Standardized interfaces

and metrics

  • Microservice Composition
  • Fog microservice dynamic

placement & optimization

  • Telemetry, metrics (SLO/SLA),

datacenter heuristics

  • Cloud Unit of Delivery (Service

Delivery)

  • Placement flow analysis
  • Placement metadata
  • Object Management

ORCHESTRATION ORCHESTRATION ORCHESTRATION

  • Datacenter Transaction Management, Federation and ORCHESTRATION
  • Fog Federation Services Layers
  • Fog Federation, Distributed ticketing and services
  • Fog Contract Management, Brokerage, insurance services

Fog Transaction Management Metrics Master Services:

  • Placement
  • Delivery
  • Assurance
  • Continuity
  • Agreement, Compliance &

Guarantees Core Services:

  • Availability
  • Recoverability
  • Failure Detection
  • Remediation
  • Problem Isolation

Business Critical Services

  • Security
  • Policy Management
  • Entitlement
  • Governance
  • Sovereignty
  • Indemnification
  • Regulatory & Compliance
  • Billing, Metering, Measurement
  • Certification
  • Validation
  • Inspection
  • Insurance
  • Safety
  • Auditing

Supply Demand

Edge Local Micro- Fog Data Center Cloud

Intel Corporation – Concept Recommendation

slide-47
SLIDE 47

Moving forward…

slide-48
SLIDE 48

OpenFog Priorities (2017-2018)

Technical Liaisons

Plan of Attack (2017 Focus)

Interface standardization with an SDO

OpenFog RA Baseline Released

Market Acceleration via Testbeds University & Industry Research Certification & Interoperability Fogfests Iterate and Refine the OpenFog Reference Architecture

Communications WG SW-Infra WG Architecture WG Security WG Manageability WG

Greater China Regional Committee Americas Regional Committee Japan Regional Committee

Q1’18

New Specifications (APIs)

Open Reference Implementation Regional Use Cases Regional Use Cases Regional Use Cases

Technical Committee Testbed WG

slide-49
SLIDE 49

www.OpenFogConsortium.org